Essentials of business process outsourcing by thomas n duening

243 270 0
Essentials of business process outsourcing by thomas n duening

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

4377_P-00(FM).qxd 1/31/05 12:42 PM Page iii ESSENTIALS of Business Process Outsourcing Thomas N Duening Rick L Click John Wiley & Sons, Inc 4377_P-00(FM).qxd 1/31/05 12:42 PM Page vi 4377_P-00(FM).qxd 1/31/05 12:42 PM Page i ESSENTIALS of Business Process Outsourcing 4377_P-00(FM).qxd 1/31/05 12:42 PM Page ii Essentials Series The Essentials Series was created for busy business advisory and corporate professionals.The books in this series were designed so that these busy professionals can quickly acquire knowledge and skills in core business areas Each book provides need-to-have fundamentals for those professionals who must: • Get up to speed quickly, because they have been promoted to a new position or have broadened their responsibility scope • Manage a new functional area • Brush up on new developments in their area of responsibility • Add more value to their company or clients Other books in this series include: Essentials of Accounts Payable, Mary S Schaeffer Essentials of Balanced Scorecard, Mohan Nair Essentials of Capacity Management, Reginald Tomas Yu-Lee Essentials of Capital Budgeting, James Sagner Essentials of Cash Flow, H.A Schaeffer, Jr Essentials of Corporate Performance Measurement, George T Friedlob, Lydia L.F Schleifer, and Franklin J Plewa, Jr Essentials of Cost Management, Joe and Catherine Stenzel Essentials of Credit, Collections, and Accounts Receivable, Mary S Schaeffer Essentials of CRM:A Guide to Customer Relationship Management, Bryan Bergeron Essentials of Financial Analysis, George T Friedlob and Lydia L F Schleifer Essentials of Financial Risk Management, Karen A Horcher Essentials of Intellectual Property, Paul J Lerner and Alexander I Poltorak Essentials of Knowledge Management, Bryan Bergeron Essentials of Patents,Andy Gibbs and Bob DeMatteis Essentials of Payroll Management and Accounting, Steven M Bragg Essentials of Shared Services, Bryan Bergeron Essentials of Supply Chain Management, Michael Hugos Essentials of Trademarks and Unfair Competition, Dana Shilling Essentials of Treasury, Karen A Horcher Essentials of Treasury and Cash Management, Michele Allman-Ward and James Sagner Essentials of XBRL, Bryan Bergeron For more information on any of the above titles, please visit www.wiley.com 4377_P-00(FM).qxd 1/31/05 12:42 PM Page iii ESSENTIALS of Business Process Outsourcing Thomas N Duening Rick L Click John Wiley & Sons, Inc 4377_P-00(FM).qxd 1/31/05 12:42 PM Page iv This book is printed on acid-free paper Copyright © 2005 by John Wiley & Sons, Inc., Hoboken, New Jersey.All rights reserved Published simultaneously in Canada No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-646-8600, or on the Web at www.copyright.com Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, 201-748-6011, fax 201-748-6008 Limit of Liability/Disclaimer of Warranty:While the publisher and author have used their best efforts in preparing this book, they make no representations or warranties with respect to the accuracy or completeness of the contents of this book and specifically disclaim any implied warranties of merchantability or fitness for a particular purpose No warranty may be created or extended by sales representatives or written sales materials.The advice and strategies contained herein may not be suitable for your situation.You should consult with a professional where appropriate Neither the publisher nor author shall be liable for any loss of profit or any other commercial damages, including but not limited to special, incidental, consequential, or other damages For general information on our other products and services, or technical support, please contact our Customer Care Department within the United States at 800-762-2974, outside the United States at 317-572-3993 or fax 317-572-4002 Wiley also publishes its books in a variety of electronic formats Some content that appears in print may not be available in electronic books For more information about Wiley products, visit our Web site at www.wiley.com Library of Congress Cataloging-in-Publication Data: Duening,Thomas N Essentials of business process outsourcing / Thomas N Duening, Rick L Click p cm —(Essentials series) Includes index ISBN 0-471-70987-5 (pbk.) Contracting out I Click, Rick L II Title III Series HD2365.D84 2005 658.4′058—dc22 2004025808 Printed in the United States of America 10 4377_P-00(FM).qxd 1/31/05 12:42 PM Page v Contents Preface vii The BPO Revolution Identifying and Selecting the BPO Opportunity 33 Identifying and Managing the Costs of BPO 67 Vendor Selection and Contracting 97 Managing BPO-Related Change 135 Infrastructure Considerations and Challenges 173 Business Risks and Mitigation Strategies 195 Index 224 v 4377_P-00(FM).qxd 1/31/05 12:42 PM Page vi 4377_P-00(FM).qxd 1/31/05 12:42 PM Page vii Preface usiness process outsourcing (BPO) has emerged as one of the leading business and economic issues of our time A natural extension of the free-trade movement that has been a dominant force in global economics over the past two decades, BPO has been met with mixed reactions.Workers whose lives have been disrupted because their jobs have been outsourced to lower-wage workers overseas have understandably decried “offshoring” as a threat to their way of life Others, especially those in the foreign locations where new jobs are rapidly being created, are elated finally to have an opportunity to gainfully deploy their hard-earned skill sets In this book, we attempt to examine BPO from the perspective of its application and implementation in businesses of all sizes We not address the political or economic controversies swirling around outsourcing Instead, we assume that the movement of service work to lowest-cost providers, no matter where they may reside, will continue in some form in the coming years It seems unlikely that new barriers will be erected that will seriously limit global free trade.With that in mind, we have developed a rigorous methodology that businesses can use to analyze the outsourcing opportunity, to make informed decisions about choosing a vendor, and to manage change and execute an outsourcing project B vii 4377_P-07.qxd 1/31/05 12:39 PM Page 216 ESSENTIALS of Business Process Outsourcing competencies as well as those jointly developed through the BPO relationship For example, firms that outsource payroll may find that additional advantages can be gained by turning over other back-office functions to the same vendor.When the PMT presses the value model, it seeks to identify other noncore processes that may be suitable for outsourcing under an existing buyer–vendor relationship umbrella.16 Value risks are inherent in any project as people strive to work together to achieve future organizational states.Working with international vendors presents higher-value risks than does working with domestic vendors in that the extent of potential value is often overstated by the foreign vendor and can take longer than expected to achieve Mitigation of these risks centers on the effectiveness of SLA negotiation, implementation, and management Some international vendors have adopted extreme value-risk mitigation tactics to ensure that project deliverables meet expectations.The following case study describes how a lead generation service mitigates this risk C ASE S TUDY Tele-SalesForce Minimizes Risks through Extensive Quality Control Tele-SalesForce (TSF) helps U.S companies outsource their lead generation processes to a call center in Calcutta, India Chad Burmeister and Tathagata Dasgupta are co-founders of the company, based in Irvine, California In less than one year of operation, TSF has signed up more than 21 clients Customers range from major companies such as PeopleSoft and Sun Microsystems to small start-ups TSF was launched with the clear goal of providing value in all aspects of a client’s lead generation process The TSF team works with new 216 4377_P-07.qxd 1/31/05 12:39 PM Page 217 Business Risks and Mitigation Strategies clients to identify their needs Following a carefully-designed, step-bystep process, TSF helps clients develop a script for the India-based call-center agents to use when talking to prospects Prior to actually getting on the phone, each call-center agent assigned to the client role-plays the script and potential prospect responses For example, an agent was assigned with acquiring leads from consumer packaged goods (CPG) companies who supply products to Wal-Mart The agent who was assigned to make those calls did not have any idea what Wal-Mart was, what a CPG company was, or how it works in the United States Additionally, the agent had no comprehension of how enterprise software application programs could help these companies TSF developed a training program for the agent that explained the relationships to the agent in terms of stores and manufacturers that she was familiar with in India The TSF project manager explained the business relationships and chemistry, what an application can in the middle of all this, and why she would be calling the decision makers of those companies This education and the resulting conviction in her voice turned a campaign from getting two leads per week into three leads per day This attention to detail helps minimize errors and enhances the chances for a successful call In addition to TSF’s careful planning to minimize risks, its call-center partner in Calcutta is equally committed to quality performance A five-year-old company, the India call center used the services of Ernst & Young at its founding to ensure that it installed best practices callcenter technologies and procedures The firm maintains its quality edge by getting regular check ups from E&Y Tele-SalesForce is anticipating sales in excess of $1 million for 2005, with growth projected to reach over $7 million by 2008 With the risk-mitigation approach the company is taking to call-center outsourcing, it stands a strong chance of meeting and even exceeding its own growth expectations 217 4377_P-07.qxd 1/31/05 12:39 PM Page 218 ESSENTIALS of Business Process Outsourcing The project management plan can also be an important tool for mitigating value risk because it specifies tasks and responsible parties that can be held accountable on a one-to-one basis Critical process flows should not be allowed to linger out of compliance for long periods without explanation and plans for remedy.The PMT should have provisions in place for emergency meetings in the event that value goals are not being reached F orce Majeure Risks Force majeure risks are the most difficult to quantify and specify.What is the likelihood of a war? A hurricane? An earthquake? No one really knows.Yet these risks can be estimated with some measure of objectivity, and an appropriate mitigation strategy can be developed and enacted Planning for Political Unrest Global geopolitical realities have brought the threat of war to nearly every doorstep.At the same time, reasonable assessments of the probability of war affecting a BPO vendor can be made Business Monitor International provides extensive coverage of the political, economic, and military risks that exist for countries around the world Its Web site (www.businessmonitor.com) provides a starting place for assessing the war risk associated with the home country of the BPO vendor Another great source of country-specific information is the U.S Department of State Web site (www.state.gov) It has extensive information for travelers and businesspeople that can help them determine the risks associated with regions worldwide.The PMT can manage its own exposure to liability by utilizing objective information sources in the development of its force majeure risk management plan The potential for political unrest exists in many countries that are desirable outlets for outsourcing, such as India and the Philippines Firms outsourcing to foreign countries should plan for the possibility of war 218 4377_P-07.qxd 1/31/05 12:39 PM Page 219 Business Risks and Mitigation Strategies IN THE R EAL W ORLD SARS and the Importance of Planning The outbreak of severe acute respiratory syndrome (SARS) affected several companies that outsourced functions, especially those based in China But the effects of SARS were felt in the United States, too Companies that had employees working in China when the SARS outbreak occurred had to move those employees back to the United States or have them quarantined In addition, companies in the United States that received packages from China were concerned about opening them in case the disease could spread The SARS outbreak illustrates the importance of planning for unusual and unexpected events Companies need to understand the flow of their business and how each function or operation could be affected by an unusual event and the impact such a conflict would have on their business Contingency plans should account for a worst-case scenario that would address questions such as: • What would you if the country were attacked? • How would you perform the outsourced functions? • How would you protect your facility and its contents and your IP? • Where would you relocate your business? Planning for Disaster and Recovery If they have not already, companies that outsource overseas need to develop disaster recovery and business continuity plans Such plans force organizations to examine possible risks and are crucial if the outsourcing 219 4377_P-07.qxd 1/31/05 12:39 PM Page 220 ESSENTIALS of Business Process Outsourcing firm wants to purchase insurance to cover property, liability, or business interruption exposures Also, it is a good idea to have a backup in place in case anything goes wrong with infrastructure, business partners, or distribution channels In addition to a backup, BPO buyers should consider drawing up a contract with the company responsible for securing the outsourcing.The terms of the contract and the shifting of the risk can be governed by that document Exhibit 7.3 provides some standard language that can be used to designate vendor responsibilities with respect to disaster recovery planning EXHIBIT 7.3 Sample Language for Disaster Recovery Scope and Definition The outsourcer shall develop and implement a plan for the prevention and mitigation of business interruptions due to natural and other causes The outsourcer shall make all reasonable efforts to prevent and recover from such events to ensure the continuity of business operations Outsourcer Responsibilities Make all reasonable efforts to ensure the continuity of operations through implementation of a disaster recovery and business continuity plan And develop a more detailed and comprehensive plan to ensure business continuity in the event of natural or other events that may cause service, supply chain, delivery, or performance interruptions The plan must address these activities that are necessary to resume operations at the optimal level at an alternative location within X number of days of a catastrophic event Source: “Touch These Bases Before You Sign to Outsource Your IT,” Contractor’s Business Management Report (November 2003): 4–5 220 4377_P-07.qxd 1/31/05 12:39 PM Page 221 Business Risks and Mitigation Strategies M anaging Risks Early Outsourcing does not mean eliminating business risk; it simply means that some risk is transferred to the BPO vendor BPO buyers should consider whether they could go back to their old systems if all else failed.17 To be effective, an outsourcing deal requires that each partner has considerable benefits to be gained, and that means sharing both risks and rewards To make that work, the BPO deal must fund the necessary investment and motivate each partner’s commitment by aligning goals Although the financial structure of conventional outsourcing arrangements typically includes bonuses and penalties based on the achievement of minimum service levels by the vendor, the focus of business transformation outsourcing deals is on upside targets They align incentives around enterprise-level outcomes such as market share and return on equity.18 When thinking about using outsourcing, the buyer must also consider the risks it brings to a potential BPO relationship The BPO provider’s readiness to undertake a BPO project is a major determinant of risks to project success A good starting point to a risk management strategy is for the potential buyer to develop a risk profile of itself Issues to consider in a risk profile include outsourcing maturity, financial stability, operational capabilities, market goodwill, and access to credit Managing risks associated with outsourcing is not unlike managing the risks associated with any other business project Firms must establish their goals before undertaking the project and then manage to those goals They must also be aware of the internal and vendor-related HR and change management issues that will arise as a result of launching a BPO project Each of the various risk factors discussed in this chapter can be managed, but constant attention is required to ensure that problems are addressed before they become unmanageable and that project value is constantly pressed to extract maximal benefit for buyer and vendor alike 221 4377_P-07.qxd 1/31/05 12:39 PM Page 222 ESSENTIALS of Business Process Outsourcing S ummary The risks facing managers and executives in organizations seeking to outsource business processes often go beyond the easily predictable Defined as those events or conditions that may prevent the BPO organization from achieving its projected benefits, these risks occur in both onshore and offshore environments and can be placed in seven categories: human capital risks, project risks, intellectual property risks, legal risks, vendor organizational risks, value risks, and force majeure risks It is vital that each of these risks be assessed—at both internal and external levels, as appropriate—and that effective strategies be put in place to anticipate, mitigate, and respond to them as circumstances require Failure to so can significantly cripple the potential upside of any BPO initiative E ndnotes Karl E.Weick and Robert E Quinn,“Organizational Change and Development,” Annual Review of Psychology (1999): 361–386 Phillip A Miscimarra and Kenneth D Schwartz,“Frozen in Time: The NLRB, Outsourcing, and Management Rights,” Journal of Labor Research (Fall 1997): 561–580 Roberto Ceniceros,“Moving Operations Overseas Offers Benefits, Challenges,” Business Insurance (December 22, 2003): 4–5 Lloyd Johnson and Anastasia D Kelly,“Managing Up, Sideways, and Down,” Corporate Legal Times (May 2002): 12–13 Mike Bates,“Managing Expectations During ISP Installations,” Law Technology News (August 2001): 55 Fred Hererra,“Demistifying and Managing Expectations,” Employment Relations Today (Summer 2003): 21–28 Michael Useem, Leading Up (New York: Crown Publishing, 2001) Rick Sturm,“Managing Up: Dealing with an Exec’s Technical Shortcomings,” CommunicationsWeek (June 3, 1996): 40 222 4377_P-07.qxd 1/31/05 12:39 PM Page 223 Business Risks and Mitigation Strategies Cade Metz,“Tech Support Coming Home?,” PC Magazine (February 17, 2004): 20 10 Lucas Mearian,“Bank Group Offers Guidelines on Outsourcing Security Risks,” Computerworld (January 26, 2004): 10 11 Nigel Howard,“Living with the FTC Safeguard Rules: Industry Tips and Experiences,” Investment Lawyer (September 2003): 1–7 12 Paul Hurley,“Outsourcing Information Security: Pros Outweigh Cons,” Energy IT (March/April 2002): 44–47 13 Robert K.Weiler,“You Can’t Outsource Liability for Security,” InformationWeek (August 26, 2002): 76 14 Marie Alner,“The Effects of Outsourcing on Information Security,” Information Systems Security (May/June 2001): 35–43 15 John Kavanagh,“Split Your Outsourcing Contracts to Guard Against Legal Disputes,” ComputerWeekly (October 14, 2003): 76 16 Part of this discussion is derived from the Sourcing Interests Group Research Report 17 “Touch These Bases Before You Sign to Outsource Your IT,” Contractor’s Business Management Report (November 2003): 4–5 18 See note 15 223 4377_P-08(ind).qxd 1/31/05 12:39 PM Page 224 Index A.T Kearney, 45 Abandonment, 112, 113 Accounting assets, 81 and core competencies, 21, 22 India, outsourcing predictions, American Arbitration Association, 131 Analysis Team (BAT), 37 AT&T example, 39 business case, 62–64 business process mapping See Business process mapping (BPM) core and noncore activities, identifying, 48–52 current-state analysis, 42, 43 goals of, 40–41 importance of, 64 leadership skills, 45 members of, 39, 40 need for, 38 opportunities, identifying, 52–58 See also Analyzing and selecting BPO opportunity preparation, 40 project model, developing, 58–62 training, 40 and Vendor Selection Team (VST), 100, 101 Analyzing and selecting BPO opportunity Analysis Team, 38–41 business case, 62–64 core and noncore activities, identifying, 48–52 costs, 71, 72 See also Costs current-state analysis, 42–48 identifying opportunities, 52–58 process for, 36, 38 project model, 58–62 project team See Project team six-step approach, 64 summary, 64 Applied Rights Directive, 119 Arbitration, 131, 213 Architecture, 177–179 Asian countries See also individual countries and educational attainment, 11, 12 Assets control and maintenance of, 158 hardware, 175–179 intellectual property See Intellectual property (IP) ownership and location of, 81, 82 protection of, 127 Audits, 178, 188 Automatic Data Processing (ADP), 26 Back-office functions, 2, and Internet security, 18, 19 onshore outsourcing, 25, 26 and size of business, 34, 35 Balanced scorecard, 164, 183 Bank Industry Technology Secretariat (BITS), 208, 209 Banks and financial institutions Gramm-Leach-Bliley Act, 127, 209 outsourcing predictions, security guidelines, 208–209 BAT See Analysis Team (BAT) Behavior norms, 165, 166 Benchmarks, 152, 153, 162 See also Performance metrics Best practices security, 20, 210, 211 BPM See Business process mapping (BPM) BPO Analysis Team (BAT) See Analysis Team (BAT) BPO champion, 138, 203 BPO Selection Matrix See Selection Matrix Bribes and kickbacks, 214 Broadband connectivity as driver of BPO, 13–15 Build-operate-transfer (BOT), 24 Business case, 62–64 Business continuity, 152, 153 Business culture, 158, 159, 167, 168, 170, 191 Business cycle, 125 Business knowledge See Knowledge Business model, 63 Business Monitor International, 218 Business process mapping (BPM) and business case, 63 employees, participation in, 69 objective of, 44 and reengineering, 74, 75 three-tier approach, 46–48 Business process outsourcing (BPO) 224 4377_P-08(ind).qxd 1/31/05 12:39 PM Page 225 Index as business strategy, 28, 29 cost-reduction projects, 85 defined, nearshore, 26, 27 offshore, 23–25 onshore, 25, 26 origins of, reasons for, 35 as sociotechnical innovation, 7–8, 197 strategic issues, 27–30, 85 types of, 23–27 Business processes, 42, 43, 50, 52 See also Core competencies Business risk See Risks Business specialization, 21–23 Business strategy, 35, 49 Business-to-business (B2B), 21–22 Business-to-consumer (B2C), 21 Buyer-vendor relationship, 82, 83 arm’s-length, 156 assets See Assets business culture See Business culture change management, 153–155 See also Change management characteristics of, 156–159 cooperative, 156 depth of, 156, 157 as extension of buyer’s organization, 156 and integration of infrastructure, 174 See also Infrastructure considerations and legal risks, 213, 214 operational phase, 89, 90 outsourcing relationship manager, 154 risk factors, 166–170, 221 scope of, 157, 158 success factors, 159–166 summary, 171 Top 10 Issues strategy, 164 Canada, 26, 27 Central America, 26, 27 Certifications, 19, 20, 110 Change ability to adapt, 203 and BPO projects, 136 experience with, 73 knowledge and understanding, importance of, 87 management See Change management resistance to, 75, 84 transformational, 22 types of, Change management benchmarking, 152, 153 building support, 149–150 business continuity, 153 buyer-vendor relationship, 153–155 challenges, 143, 144 communication, 148, 149 elements of, 141 general principles of, 140, 141 honesty, 144, 145, 148, 149 and human capital risks, 197, 199 job loss and changeover, 150–152 See also Reduction-in-force (RIF) plan leadership roles, 142, 143, 147, 148 need for, 136, 137 project management plan, 137–140 Project Management Team, role of, 140 roles, 142–147 satisficing concept, 141 storytelling, use of, 142, 143 strategy, 136 summary, 170, 171 unfreezing-moving-refreezing, 197 vision, creating, 142 China back-office jobs, and educational attainment, 11, 12 outsourcing predictions, and SARS outbreak, 219 as source of manufacturing and technical services, Choice of law clause, 131 Client access license (CAL), 182 Co-sharing risk/reward pricing model, 125 Collective bargaining, 199, 200 See also Labor laws Commitment, escalation of, 62 Communication and buyer-vendor relationship, 154, 157 expectations management, 207, 208 honesty, 144, 145, 148, 149 language training, 191 leadership’s role, 148, 149 Competition, monitoring, 88 Competitive advantage, 7, Complexity of jobs, Consultants and analysis phase costs, 72–74 and cost mitigation, 80 overreliance on, 74 transition phase, 85 Contracts buyer’s responsibilities, 161, 163 development contracts, 214 dispute resolution, 130, 131 drafting, 114 and employment laws, 119 flexibility, 168 force majeure, 130, 218–220 governance, 126 incentives, 186 industry-specific concerns, 127 intellectual property, 126, 127 and legal risk, 213, 214 225 4377_P-08(ind).qxd 1/31/05 12:39 PM Page 226 Index Contracts (Cont.) negotiation, 78, 89, 90, 114, 116, 117 precontract stage, 113, 114 pricing, 123–125 and RFP guidelines, 108 rules of thumb, 114, 115 scope of work (SOW), 118 service-level agreements (SLAs) See Servicelevel agreements (SLAs) splitting, 213 summary, 131, 132 term, 125 termination of, 125, 127–130 terms of, 117, 118 transition provisions, 129, 130 trial period, 113 Core competencies, 21–23 and BPO, 2–3 and business strategy, 49 core activities, 50, 52 defining, 48–50 and strategic costs, 90 Corporate culture See Business culture Corrpro Companies, Inc., 51 Cost plus pricing, 124 Costs consultants, 72–74 direct costs, 91 drivers of transition phase, 81 estimating, 78 financial (hard costs), 68, 69 analysis phase, 71–75 hidden costs, 70, 71, 74 implementation phase, 75–80 operational phase, 85–90 personnel, 71, 72 predictable costs, 70 third-party support, 72–74 transition phase, 80–85 hidden costs, 84, 89, 91, 92 mitigating, 74–75, 84, 85 modeling, 60 opportunity costs, 70 as part of Selection Matrix, 68 savings, 94 strategic (soft costs), 68, 69, 90–92 summary, 94 total cost management (TCM), 69, 70, 92–94 training, 73 Creative services, Critical functions, 50 Culture See Business culture Customer relationship management (CRM), 27 Customer satisfaction, 87–89, 121 Customers’ expectations, 62, 207, 208 Data corruption, 186 Data mining, 180, 181 Data reconfiguration, 186 Data storage, 15–17, 180 Databases, 83, 181 Deadlines, 106, 107 See also Timing Department of State, 218 Digital subscriber line, 13, 14 Disaster planning See Force majeure Dispute resolution, 130, 131, 213 Drivers of BPO analytic software, 17, 18 broadband Internet, 13–15 business specialization, 21–23 chart, 10 data storage, 15–17 educational attainment, 9–13 Internet security, 18–21 DSL, 13, 14 Due diligence, 56, 127 EDS, 91, 155 Educational attainment as driver of BPO, 9–13 Electronic data interchange (EDI), 183 Electronic Data Systems Corporation (EDS), 91, 155 Emergent change, Employees See also Human capital risks adjustment periods, 84 becoming employees of vendor, 91, 92 and business-process mapping, 69 communication with See Communication concerns of, 150 costs associated with, 69, 71, 72 effects of BPO, 149, 150 and internal qualitative metrics, 87 and job security, 86 labor law See Labor laws morale, 92 and precontract stage, 114 productivity See Productivity professional employer organizations, 22 reduction-in-force plan See Reduction-inforce (RIF) plan removal from jobs to participate on BAT, 71, 72 European Union (EU), 19, 119 Evolutionary change, Expectations, 62, 204–208 Federal Trade Commission (FTC), 209 File transfers, 183 Financial institutions See Banks and financial institutions Financial ratios, 85, 86 FirmBuilder, 106 Fixed pricing, 124 Flexibility, 165, 200 FMC Corporation, 155 Force majeure 226 4377_P-08(ind).qxd 1/31/05 12:39 PM Page 227 Index contract clause, 130 disaster planning, 219, 220 political unrest, 218, 219 risks, 218 Foreign Corrupt Practices Act, 214 Free-trade agreements, impact of, The Gartner Group, GE Real Estate, 79 General Electric (GE), 21, 23, 25 Go/No-Go decision strategy, 62 Goals, alignment of, 169, 170, 221 Governance, 169 Gramm-Leach-Bliley Act (GLB), 127, 209 Hard issues, 104 Hardware infrastructure, 175–179 training and support See Training and support Hawthorne effect, 75 Health Insurance Portability and Accountability Act of 1996 (HIPAA), 20, 61, 127, 209, 210 Help desk, 192 High-speed Internet, 13–15 Honesty, 144, 145, 148, 149 Human capital risks and change management, 197, 199 foreign labor laws, 200 human resources practices, 215 professionalism, 201 labor-related, 199, 200 mitigation, 201, 202 reduction-in-force management See Reduction-in-force (RIF) plan sweatshops, 202 Human factors, 8, Human resources See Employees; Human capital risks IBM, 23, 196 Implementation of BPO costs, 76–78, 80 See also Costs phases of, 75 technology issues, 8, Incentives, 186 India accountants, back-office jobs, employment law, 200 and intellectual property protection, 127 outsourcing predictions, political unrest, 218 radiologists, as source of engineering and technical services, Indian IT Act of 2000, 19 Information technology (IT) See also Hardware infrastructure; Software infrastructure integration of, 170 and origins of BPO, 7, outsourcing predictions, Infrastructure considerations goal of integration, 174 hardware, 175–179 knowledge, 183–188 software, 179–183 summary, 192, 193 training and support, 188–192 Integrity of information, 186, 187 Intellectual property (IP), 126, 127, 208, 209 International Arbitration Association, 213 International Chamber of Commerce, 131 International Court of Arbitration, 131 International Organization for Standardization (ISO) certifications, 110 information security best practices (BS 7799), 20 security management (ISO 17799), 20 Internet broadband connectivity, 13–15 security, 18–21, 187, 188 and vendor identification, 98, 104 Interviews of potential vendors, 107, 109, 110 Jobs See also Employees; Reduction-in-force (RIF) plan complexity of, loss of, 5, 6, 150 Kerberos technology, 19 Key functions, 50 Key performance indicators (KPIs), 121 Knowledge and buyer-vendor relationship, 154 infrastructure, 183–187 management, 90 Labor laws and business culture, 159 employment laws and contract terms, 119 foreign laws, 200 foreign practices, 215 National Labor Relations Act (NLRA), 199 and risk management, 199, 200 Leadership building support, 150 and change management, 143 expectations management, 62, 204–206 skills, 45 and training, 191 visibility and accessibility, 147, 148 Legal risks, 212–214 Legislation Foreign Corrupt Practices Act, 214 Gramm-Leach-Bliley Act, 127, 209 227 4377_P-08(ind).qxd 1/31/05 12:39 PM Page 228 Index Legislation (Cont.) guest worker visas, 202 Health Insurance Portability and Accountability Act of 1996 (HIPAA), 20, 61, 127, 209, 210 Indian IT Act of 2000, 19 labor laws See Labor laws National Labor Relations Act (NLRA), 199 privacy, 19–21 Licensing agreements, 182 Managed-security providers (MSPs), 211, 212 Management change management See Change management expectations, 62, 204–207 managing up, 205 non-outsourced functions, 206, 207 Project Management Team, 37 risk See Risks support of, 73, 74 and training, 191 Manufacturing, 2, 3, 6, 47 Maquiladoras, Margin enhancement, 85 Medical records See also Health Insurance Portability and Accountability Act of 1996 (HIPAA) security risk management, 209, 210 Mergers, similarities to, 91 Mexico, 2, 3, 26 Microsoft, 25, 181 Middleware, 181 Mitigation See also Risks implementation costs, 80 project risks, 203, 204 risk-probability matrix, 205 value risk, 215–218 vendor risks, 214, 215 National Labor Relations Act (NLRA), 199 National Labor Relations Board (NLRD), 199 Nearshore outsourcing, 26, 27 Negotiations, 89, 90, 116, 117, 154 Noncore activities identifying, 48–52 and strategic costs, 90 North American Free Trade Agreement (NAFTA), Objectives of BPO project, 58, 59 Obstructionists managing, 147 overcoming, 145 social facilitation, 189 training and support, 189, 190 Offshore insourcing, 24 Offshore outsourcing, 23–25, 177 Online analytic processing (OLAP), 17, 18 Onshore outsourcing, 25, 26 Open database connectivity (ODBC), 181, 182 Operational phase, 85–90, 192 See also Infrastructure considerations Opportunities, analyzing and selecting See Analyzing and selecting BPO opportunity Organizational learning, 15–17, 68, 75 Output, 86 Outsourcing Center, 106 Outsourcing Institute, 106 Outsourcing relationship manager, 154, 155 OutsourcingCentral.com, 106 Overhead, 85, 86 Passwords, 188 Payroll outsourcing, 26 PeopleSoft, 216 Performance-based pricing, 125 Performance metrics See also Benchmarks enhanced performance, 35 financial metrics, 85, 86 and project objectives, 58, 59 qualitative (soft) data, 58 quantitative (hard) data, 58 timing of key events, 59, 60 Personnel See Employees Pew Internet & American Life Project, 14, 15 Philippines, 2–4, 218 Pilot programs, 62 PMT See Project Management Team (PMT) Political unrest See Force majeure Pricing contract negotiations, 123–125 models, 124, 125 and RFP guidelines, 108 transfer pricing, 72 Privacy risks, 61 See also Risks Productivity, 84–87 Professional employer organizations (PEOs), 22, 34 Profit, 161, 162 Project life cycle, 69 Project management plan hybrid approach, 138–140 individual versus team approach, 137–139 need for, 137 Project Management Team (PMT) See Project Management Team (PMT) Project Management Team (PMT) and buyer control, 166, 167 and change management See Change management emergency meetings, 218 interpersonal relationships, 161, 164, 165 management responsibility (BPO champion), 138, 203 and managing multiple vendors, 157, 158 members of, 140, 206 228 4377_P-08(ind).qxd 1/31/05 12:39 PM Page 229 Index problem identification and resolution, 161, 163, 164 provisions for changing, 161, 163 and risk-management strategy, 196 team structure, 139 Project model, 58–62 Project team Analysis Team (BAT) See Analysis Team (BAT) need for, 36 Project Management Team See Project Management Team (PMT) Steering Team, 37, 138, 158 team structure, 36–37 Vendor Selection Team (VST) See Vendor Selection Team (VST) Proposals, evaluation of, 108–110 Public key infrastructure (PKI), 19 Public relations, 153 Qualitative measures, 87 Quality management, 22, 23 Reduction-in-force (RIF) plan elements of, 151 example of bad practice, 198 and human capital risks, 199 impact on employees, 152 and media interest, 153 need for, 151 projections, 150 Reengineering, 179, 184 References, 110 Request for information (RFI), 106, 107 Request for proposal (RFP) additional items to be furnished by vendor, 110 contents of, 107 evaluation of proposals, 108–110 guidelines for, 108 in-house versus third-party preparation, 76 response to, 76–78 timeframe for process, 77 Resource theory, 49 Return on investment (ROI), 85 RFI, 106, 107 RFP See Request for proposal (RFP) Risks buyer-vendor relationship risk factors See Buyer-vendor relationship categories, 196, 197 early management, 221 force majeure, 218–220 human capital, 197–202 intellectual property, 208–212 legal, 212–214 management, 221, 222 mitigation, 60, 205 implementation costs, 80 project risks, 203, 204 and risk-probability matrix, 205 value risk, 215–218 vendor risks, 214, 215 privacy, 61 project risks, 202–208 risk-probability matrix, 205, 206 small to medium-sized enterprises, 196 summary, 222 value, 215–218 vendor organizational risks, 214, 215 vendor’s hardware, reliance on, 176, 177 ROI, 85 Russia, Salary comparisons, SANS Institute, 211 SARS, 219 Satisficing, 141 Scope of work (SOW), 106, 118 Security best practices and standards, 210, 211 information security, 186, 187 Internet, 187, 188 and legal risks, 212, 213 managed-security providers (MSPs), 211, 212 questions for vendors, 187 responsibilities, 212 risk management, 208–210 Selection Matrix, 53–58, 68 Servers, 182 Service-level agreements (SLAs), 89, 119–123 flexibility, 168 and infrastructure considerations, 175 and legal risks, 213, 214 recalibration, provisions for, 161, 162 sample provisions, 120 specifications, importance of, 168, 169 Severe acute respiratory syndrome (SARS), 219 Shareholders expectations, 62, 207, 208 monitoring reactions of, 88, 89 Single sourcing, 104 Site visits, 107 Six Sigma, 110, 153 Small to medium-sized enterprises (SMEs), 34, 196 Social facilitation, 189, 190 Soft issues, 104 Software infrastructure analytic software, 17, 18, 183, 184 client access license (CAL), 182 data and information distribution and publishing, 180, 181 data transfers, third-party involvement, 83 database issues, 179, 180 licensing agreements, 182 229 4377_P-08(ind).qxd 1/31/05 12:39 PM Page 230 Index Software infrastructure (Cont.) middleware, need for, 181 system connections, 182, 183 training and support See Training and support Sole sourcing, 104 Standard operating procedures (SOPs), 190, 197 Statement of work See Scope of work (SOW) Steering Team, 37, 138, 158 Storytelling, organizational, 142, 343 Strategic costs, 90–92 See also Costs Strategy See Business strategy Sunk-cost effect, 62 Suppliers buyer-vendor relationship compared, 99, 100, 116, 117 expectations, 62, 207, 208 Support functions, 52 Sweatshops, 202 Systems theory, 43, 44 Task-based costing, 72 Technical services, 2, 181 Technology, 1, 2, 8, See also Information technology (IT) hardware See Hardware infrastructure software See Software infrastructure Tele-SalesForce (TSF), 216, 217 Tender, 110 Termination of contract, 127–130 Timing key events, 59, 60 response to RFI, 106, 107 and risk mitigation, 203 Top 10 Issues strategy, 164 Tort law and security breaches, 210, 211 Total cost management (TCM), 69, 70, 92–94 Total quality management (TQM), 73 Trade-Related Aspects of Intellectual Property Rights (TRIPs), 126 Training and support, 73, 188–192 Transfer of Undertakings Protection of Employment (TUPE), 119 Transfer pricing, 72 Transition phase See also Change management characteristics of, 174 consultants, use of, 85 costs, 80–85 infrastructure integration See Infrastructure considerations systematic support system for, 192 Trends, 4, Trust, importance of, 160, 161 Unemployment, 5, Unit pricing, 124 United Kingdom, 19, 119 United States, 2, 10–13 Value, 203, 215–218 Variable pricing, 124 Vendor selection contract negotiation See Contracts and cultural differences, 167 final review, 112 implementation phase, 76 importance of, 98 potential vendor list, 104–106, 110–112 process for, 98 proposal evaluation, 108–110 requests for information (RFI), 106, 107 requests for proposals (RFPs), 107, 108 selection of vendor, 112–115 sources of vendor information, 104, 106 steps involved, 99–115 summary, 131 and unsolicited proposals, 105 vendor qualifications, establishing, 102–104 Vendor Selection Team (VST) See Vendor Selection Team (VST) vendor selection team (VST), appointing, 99–102 Vendor Selection Team (VST), 37 appointment of, 99–102 charter, 101, 105 members of, 102 Vendors breadth of relationship, 83 contract negotiation, 78 directories of, 106 managing, 79 presentations by, 111, 112 qualifications, establishing, 102–104 relationship with See Buyer-vendor relationship risks associated with, 214, 215 selection of See Vendor selection single-service versus multiple-service, 157 site visits, 107 Venture capital and BPO funding, Venue, 131 Virtual private network (VPN), 182 Visas, 202 Vision, 142, 143 VST See Vendor Selection Team (VST) Wal-Mart, 202, 217 War See Force majeure Wide area network (WAN), 182 World Trade Organization Trade-Related Aspects of Intellectual Property Rights (TRIPs), 126 230 ... Library of Congress Cataloging-in-Publication Data: Duening ,Thomas N Essentials of business process outsourcing / Thomas N Duening, Rick L Click p cm — (Essentials series) Includes index ISBN 0-471-70987-5... Lerner and Alexander I Poltorak Essentials of Knowledge Management, Bryan Bergeron Essentials of Patents,Andy Gibbs and Bob DeMatteis Essentials of Payroll Management and Accounting, Steven M... Essentials of Shared Services, Bryan Bergeron Essentials of Supply Chain Management, Michael Hugos Essentials of Trademarks and Unfair Competition, Dana Shilling Essentials of Treasury, Karen

Ngày đăng: 01/04/2017, 09:38

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan